Professional Documents
Culture Documents
Compulsory Internal Assignment (ADVANCED INFORMATION SECURITY 2)
Compulsory Internal Assignment (ADVANCED INFORMATION SECURITY 2)
Plain Text
Parallel Text
Encrypted Text
Decrypted Text
PAP
CHAP
EAP
CHAP V3
RADIUS
ARP
EAP
PAP
www.ideunom.ac.in/mcq/questionpaper_pg.php?eGprSTdzUmk0R3hKMDkyYWJrZTMzVDBsZklvNDI4UXNVMXhuSUFjTVhXWUZibGE3T1JSS2… 1/4
4/16/24, 2:35 PM Compulsory Internal Assignment (CBCS SEMESTER PATTERN)
6. A user/session authentication process that permits a user to enter one name and password in
order to access multiple applications.
Secure Sign On
Session Sign
Single Sign On
Single Sign In
Ticket
Local
Token
User
Transport Layer
Network Layer
Application Layer
Session Layer
TCP/IP
RADIUS
Telnet
PPP
Waterfall model
V model
Iterative model
Spiral Model
www.ideunom.ac.in/mcq/questionpaper_pg.php?eGprSTdzUmk0R3hKMDkyYWJrZTMzVDBsZklvNDI4UXNVMXhuSUFjTVhXWUZibGE3T1JSS2… 2/4
4/16/24, 2:35 PM Compulsory Internal Assignment (CBCS SEMESTER PATTERN)
Developer
Designer
Tester
QA Team
14. In Cryptography, the process of transforming messages is to make them secure and immune
to
Change
Idle
Attacks
Defend
Source authentication
Privacy
Data Integrity
All of the Above
Software Design
Software Cost Estimation
Software Cost Approximation
Software Analysis
Simple Text
Plain Text
Cipher Text
Empty Text
Cryptology
Cryptography
Cryptanalysis
Crypting
www.ideunom.ac.in/mcq/questionpaper_pg.php?eGprSTdzUmk0R3hKMDkyYWJrZTMzVDBsZklvNDI4UXNVMXhuSUFjTVhXWUZibGE3T1JSS2… 3/4
4/16/24, 2:35 PM Compulsory Internal Assignment (CBCS SEMESTER PATTERN)
SAVE
www.ideunom.ac.in/mcq/questionpaper_pg.php?eGprSTdzUmk0R3hKMDkyYWJrZTMzVDBsZklvNDI4UXNVMXhuSUFjTVhXWUZibGE3T1JSS2… 4/4